BugId OOBW[4n]-4n~4n ed2.531 @ tests_x64.exe!wmain summary

BugId: OOBW[4n]-4n~4n ed2.531
Location: tests_x64.exe!wmain
Source: p:\dev\cbugid\tests\src\_tmain.cpp @ 485
Description: Heap corruption detected at 0x21A47801FFC; 4 bytes before a 8388608/0x800000 bytes heap block at 0x21A47802000.
Version: Tests_x64.exe: Wed May 10 23:51:46 2017 (59138B72) (x64)
Security impact: Potentially exploitable security issue, if the corruption is attacker controlled.
Integrity level: 0x2000 (Medium Integrity; this process appears to not be sandboxed!)
Arguments: ['OutOfBounds', 'Heap', 'Write', '0x800000', '-4', '4']

BugId version 2017-11-14 10:21. You may not use this version of BugId for commercial purposes. Please contact the author if you wish to use BugId commercially. Contact and licensing information can be found at the bottom of this report.

Stack

  1. verifier.dll!VerifierCaptureContextAndReportStop + 0x100 (this frame is irrelevant to this bug)
  2. verifier.dll!VerifierStopMessage + 0x2AB (this frame is irrelevant to this bug)
  3. verifier.dll!AVrfpDphReportCorruptedBlock + 0x330 (this frame is irrelevant to this bug)
  4. verifier.dll!AVrfpDphCheckNormalHeapBlock + 0xC4 (this frame is irrelevant to this bug)
  5. verifier.dll!AVrfpDphNormalHeapFree + 0x27 (this frame is irrelevant to this bug)
  6. verifier.dll!AVrfDebugPageHeapFree + 0xAF (this frame is irrelevant to this bug)
  7. ntdll.dll!RtlDebugFreeHeap + 0x3C (this frame is irrelevant to this bug)
  8. ntdll.dll!RtlpFreeHeap + 0x876A4 (this frame is irrelevant to this bug)
  9. ntdll.dll!RtlFreeHeap + 0x409 (this frame is irrelevant to this bug)
  10. Tests_x64.exe!wmain + 0x19B0 (id: ed2) [[p:\dev\cbugid\tests\src\_tmain.cpp @ 485]]
  11. Tests_x64.exe!invoke_main + 0x22 (inlined function, id: 531)
  12. Tests_x64.exe!__scrt_common_main_seh + 0x11D [[f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253]]
  13. KERNEL32.DLL!BaseThreadInitThunk + 0x14
  14. ntdll.dll!RtlUserThreadStart + 0x21
⇓ click on the title of a section to open or close it.